DescriptionThe FireEye Labs Obfuscated String Solver (FLOSS) uses advanced static analysis
techniques to automatically deobfuscate strings from malware binaries. You can
use it just like strings.exe to enhance basic static analysis of unknown
binaries.
Rather than heavily protecting backdoors with hardcore packers, many malware
authors evade heuristic detections by obfuscating only key portions of an
executable. Often, these portions are strings and resources used to configure
domains, files, and other artifacts of an infection. These key features will not
show up as plaintext in output of the strings.exe utility that is commonly used
during basic static analysis.

Log message:
Add RUN_DEPENDS to TEST_DEPENDS automatically for ports using the
lang/python port module. I've not yet come up with a port that
would not need this and one can always set MODPY_TESTDEP to "no"
to prevent the module from touching TEST_DEPENDS.
Idea from afresh1 who pointed out the cpan module already does this.
aja "I support this move."
OK sthen@